´╗┐ CompTIA Security+ Certification Training Online

CompTIA Security+ Certification Training

Learn Security & Get Certified in One
of the Fastest Growing Fields in IT

Security professionals such as security architects and security engineers have the skills that companies need to protect their critical and proprietary business data. Get the training you need to enter this increasingly important field. These videos take you step-by-step through security practices with hands-on labs and practice exams to reinforce what you are learning.

Overview - New for 2017/2018

This CompTIA Security+ Training Suite fully prepares students for one of the most recognized security certifications in the industry while covering the latest exam objectives for the Security+ exam SY0-501. As one of the options for certifications required by the U.S. Department of Defense for both personnel and contractors, Security+ certification not only increases your value in a field that is growing in demand, but also offers individuals a broader scope of employment opportunities. Whether you are new to information security, or have been working in the field and want to become CompTIA Security+ certified, this training course includes everything you would expect in the top self-paced training product on the market. Learn how to secure Windows networks, protect against viruses and malware, secure data access through encryption, secure network protocols and ports, prevent denial of service (DoS) attacks, and much more.

Screenshots

Look Inside - Video Tour

Learn why these training solutions are being used by 1000s of Schools and Companies.

Security+ Suite 36 Hrs N/A 107 134

1 Lab time is approximated to 5 minutes per lab. Actual time may vary.
2 Each question includes a full explanation with exam objective reference(s).
3 Each fact sheet contains one or more printable pages.

Security+ Testimonial

Introduction

This instructor-led Security+ training suite provides more than 19 hours of engaging video lessons, 117 demonstrations (16 hours), 74 interactive hands-on labs (for students to practice their skills), 134 printable documents (Fact Sheets), 107 exam questions. Students are provided with a complete training solution for this certification which is recognized by the technology community as a valuable credential that proves competency with information security. This Security+ training suite will prepare the student with the skills needed to succeed both on the job and on exam day.

Learning Tools

The learning tools incorporated into this CompTIA Security+ Training Suite have helped over 95% of our students pass their exams. These integrated learning tools are as follows:

  • Video Training - Classroom quality lectures, demonstrations, and illustrations by certified trainers (Video, audio, & animations).
  • Lab Exercises - Student performs actual hands-on lab exercises in a realistic Windows network environment.
  • Practice Exams - Exam Simulators and Self Assessment Tools simulate the look and feel of the actual exams.

Features

Immerse yourself into the most effective computer based Security+ certification training suite available today! Get the training you need to effectively learn real-world concepts and skills, and quickly prepare for the certification exams. Perform hands-on labs in realistically simulated hardware & Windows learning environment.

  • The most effective learning tool available
  • Over 95% of our students pass their exams
  • See & hear your trainer with video lessons
  • Easy to understand lessons with examples
  • Demonstrations, Animations, & Scenarios
  • Practice exams with answers to all questions
  • Simulates the look & feel of the actual exams

30-Day Money Back Guarantee When you purchase your subscription, you may evaluate the online courseware for up to a maximum of 10 hours for your risk free evaluation. If you are not completely satisfied with your purchase, simply contact us for a full refund within 30 days.

Course Outlines - Security+ Certification Training

  Title (click on title below for course outline) Exam#
Core Security+ Certification Suite SY0-501

CompTIA Security+ Certification Training Series

Part#: tosecplus | Contents: 12 Months of Online Training

Format

Reg: $495.00
Sale: $395.00
*No tax except for Maryland (USA) residents.

Online Training: Order now, start your training in 1 business day

Payment options:

Order securely online or call 1-888-797-4040 (301-589-3349)

All major credit cards (Visa, MasterCard, Amex, and Discover)

PayPal: Pay online quickly with your PayPal account

Company PO's accepted (Net 30); Call for multi-user license

System Requirements: 2.2 GHz or higher (Processor), High-Speed Internet (3.6 MBPS or faster per computer), 3 GB RAM, Sound Card. Supported Browsers: Google Chrome 31+, Microsoft IE 10+, Microsoft Edge 20+, Firefox 42+, and Safari 8+. Operating System: Windows 7, Windows 8.1, and Windows 10. Mac OS: 10.8 or higher. IOS on iPad (Videos and Text only). [Special note: systems requirements for Microsoft Office 2013 students: 64-Bit Windows OS, Intel-based Mac OS. VM Virtual Machine: Graphics Acceleration Enabled]

 

Course Outline

Videos: 139 (19:40:38)
Demonstrations: 117 (16:25:11)
Simulations: 74
Fact Sheets: 134
Exams: 107

1.0 INTRODUCTION
1.1 Security Overview
1.1.1 Security Challenges (8:22)
1.1.2 Security Roles and Concepts (5:37)
1.1.3 Threat Agent Types (8:20)
1.1.4 Security Introduction
1.1.5 General Attack Strategy (8:51)
1.1.6 General Defense Strategy (18:25)
1.1.7 Attack and Defense Strategy Overview
1.1.8 Practice Questions - Section 1.1
1.2 Using the Simulator
1.2.1 Using the Simulator (13:19)
1.2.2 Configure a Security Appliance
1.2.3 Install a Security Appliance

2.0 ACCESS CONTROL AND IDENTITY MANAGEMENT
2.1 Access Control Models
2.1.1 Access Control Models (3:38)
2.1.2 Access Control Facts
2.1.3 Access Control Model Facts
2.1.4 Access Control Model Examples
2.1.5 Implementing Discretionary Access Control (6:09)
2.1.6 Practice Questions - Section 2.1
2.2 Authentication
2.2.1 Authentication Part 1 (11:26)
2.2.2 Authentication Part 2 (8:53)
2.2.3 Authentication Facts
2.2.4 Using a Biometric Scanner (3:49)
2.2.5 Using Single Sign-on (12:20)
2.2.6 Single Sign-on Facts
2.2.7 Practice Questions - Section 2.2
2.3 Authorization
2.3.1 Authorization (5:15)
2.3.2 Cumulative Access (9:32)
2.3.3 Authorization Facts
2.3.4 Examining the Access Token (9:08)
2.3.5 Practice Questions - Section 2.3
2.4 Access Control Best Practices
2.4.1 Access Control Best Practices (3:12)
2.4.2 Viewing Implicit Deny (10:13)
2.4.3 Best Practices Facts
2.4.4 Practice Questions - Section 2.4
2.5 Active Directory Overview
2.5.1 Active Directory Introduction (9:04)
2.5.2 Active Directory Structure (9:25)
2.5.3 Viewing Active Directory (8:05)
2.5.4 Active Directory Facts
2.5.5 Practice Questions - Section 2.5
2.6 Windows Domain Users and Groups
2.6.1 Creating User Accounts (4:50)
2.6.2 Managing User Account Properties (7:45)
2.6.3 Create User Accounts
2.6.4 Manage User Accounts
2.6.5 Managing Groups (5:05)
2.6.6 Create a Group
2.6.7 Create Global Groups
2.6.8 User Account Management Facts
2.6.9 Practice Questions - Section 2.6
2.7 Linux Users
2.7.1 Linux User and Group Overview (19:14)
2.7.2 Managing Linux Users (9:28)
2.7.3 Linux User Commands and Files
2.7.4 Create a User Account
2.7.5 Rename a User Account
2.7.6 Delete a User
2.7.7 Change Your Password
2.7.8 Change a User's Password
2.7.9 Lock and Unlock User Accounts
2.7.10 Practice Questions - Section 2.7
2.8 Linux Groups
2.8.1 Managing Linux Groups (3:15)
2.8.2 Linux Group Commands
2.8.3 Rename and Create Groups
2.8.4 Add Users to a Group
2.8.5 Remove a User from a Group
2.8.6 Practice Questions - Section 2.8
2.9 Linux User Security
2.9.1 Linux User Security and Restrictions (9:53)
2.9.2 Configuring Linux User Security and Restrictions (6:40)
2.9.3 Linux User Security and Restriction Facts
2.9.4 Practice Questions - Section 2.9
2.10 Group Policy Overview
2.10.1 Group Policy Overview (8:41)
2.10.2 Viewing Group Policy (14:31)
2.10.3 Group Policy Facts
2.10.4 Create and Link a GPO
2.10.5 Practice Questions - Section 2.10
2.11 Hardening Authentication 1
2.11.1 Hardening Authentication (19:31)
2.11.2 Configuring User Account Restrictions (9:30)
2.11.3 Configure User Account Restrictions
2.11.4 Configuring Account Policies and UAC Settings (14:18)
2.11.5 Configure Account Policies
2.11.6 Hardening User Accounts (10:20)
2.11.7 Restrict Local Accounts
2.11.8 Secure Default Accounts
2.11.9 Enforce User Account Control
2.11.10 Hardening Authentication Facts
2.11.11 Practice Questions - Section 2.11
2.12 Hardening Authentication 2
2.12.1 Configuring Smart Card Authentication (6:20)
2.12.2 Configure Smart Card Authentication
2.12.3 Smart Card Authentication Facts
2.12.4 Using Fine-Grained Password Policies (7:00)
2.12.5 Fine-Grained Password Policy Facts
2.12.6 Create a Fine-Grained Password Policy
2.12.7 Practice Questions - Section 2.12
2.13 Remote Access
2.13.1 Remote Access (8:44)
2.13.2 Remote Access Facts
2.13.3 RADIUS and TACACS+ (6:52)
2.13.4 RADIUS and TACACS+ Facts
2.13.5 Practice Questions - Section 2.13
2.14 Network Authentication
2.14.1 Network Authentication Protocols (14:09)
2.14.2 Network Authentication via LDAP (10:31)
2.14.3 Network Authentication Facts
2.14.4 Controlling the Authentication Method (6:39)
2.14.5 Configure Kerberos Policy Settings
2.14.6 Browsing a Directory Tree via LDAP (6:38)
2.14.7 Trusts and Transitive Access (5:34)
2.14.8 Trusts and Transitive Access Facts
2.14.9 Credential Management (10:06)
2.14.10 Credential Management Facts
2.14.11 Practice Questions - Section 2.14
2.15 Identity Management
2.15.1 Identity Management (16:31)
2.15.2 Identity Management Facts
2.15.3 Practice Questions - Section 2.15

3.0 CRYPTOGRAPHY
3.1 Cryptography
3.1.1 Cryptography Concepts (4:30)
3.1.2 Cryptography Facts
3.1.3 Cryptographic Attacks (17:48)
3.1.4 Cryptographic Attack Facts
3.1.5 Practice Questions - Section 3.1
3.2 Hashing
3.2.1 Hashing (11:31)
3.2.2 Hashing Facts
3.2.3 Using Hashes (7:43)
3.2.4 Practice Questions - Section 3.2
3.3 Symmetric Encryption
3.3.1 Symmetric Encryption (5:27)
3.3.2 HMAC (6:14)
3.3.3 Symmetric Encryption Facts
3.3.4 Cracking a Symmetric Encryption Key (4:11)
3.3.5 Practice Questions - Section 3.3
3.4 Asymmetric Encryption
3.4.1 Asymmetric Encryption (8:14)
3.4.2 Asymmetric Encryption Facts
3.4.3 Practice Questions - Section 3.4
3.5 Public Key Infrastructure (PKI)
3.5.1 Certificates (11:02)
3.5.2 Managing Certificates (14:45)
3.5.3 Manage Certificates
3.5.4 Certificate Lifecycle Facts
3.5.5 CA Implementation (5:17)
3.5.6 Configuring a Subordinate CA (14:13)
3.5.7 PKI Management Facts
3.5.8 Practice Questions - Section 3.5
3.6 Cryptography Implementations
3.6.1 Combining Cryptographic Methods (10:30)
3.6.2 Hardware Based Encryption Devices (7:13)
3.6.3 Cryptographic Implementation Facts
3.6.4 Practice Questions - Section 3.6

4.0 POLICIES, PROCEDURES, AND AWARENESS
4.1 Security Policies
4.1.1 Security Policies (7:23)
4.1.2 Data Privacy Laws (9:43)
4.1.3 Security Policy Facts
4.1.4 Security Documentation Facts
4.1.5 Security Management Facts
4.1.6 Information Classification (5:40)
4.1.7 Information Classification Facts
4.1.8 Data Retention Policies (11:40)
4.1.9 Wiping a Hard Drive (12:58)
4.1.10 Data Retention Facts
4.1.11 Practice Questions - Section 4.1
4.2 Manageable Network Plan
4.2.1 Manageable Network Plan (16:49)
4.2.2 Manageable Network Plan 2 (14:05)
4.2.3 Manageable Network Plan Facts
4.2.4 Practice Questions - Section 4.2
4.3 Business Continuity
4.3.1 Business Continuity (2:39)
4.3.2 Succession Planning (5:23)
4.3.3 Business Continuity Facts
4.3.4 Practice Questions - Section 4.3
4.4 Risk Management
4.4.1 Risk Management (4:04)
4.4.2 Security Controls (3:21)
4.4.3 Data Loss Prevention (DLP) (4:57)
4.4.4 Risk Management Facts
4.4.5 Practice Questions - Section 4.4
4.5 Incident Response
4.5.1 First Responder (7:17)
4.5.2 Basic Forensic Procedures (18:31)
4.5.3 Using Forensic Tools (6:17)
4.5.4 Creating a Forensic Drive Image (10:00)
4.5.5 Incident Response Facts
4.5.6 Forensic Investigation Facts
4.5.7 Practice Questions - Section 4.5
4.6 Social Engineering
4.6.1 Social Engineering (4:40)
4.6.2 Phishing Variations (13:04)
4.6.3 Social Engineering Facts
4.6.4 Investigating a Social Engineering Attack (9:45)
4.6.5 Respond to Social Engineering
4.6.6 Practice Questions - Section 4.6
4.7 Certification and Accreditation
4.7.1 Trusted Computing (10:01)
4.7.2 Certification and Accreditation (4:46)
4.7.3 Certification and Accreditation Facts
4.7.4 Practice Questions - Section 4.7
4.8 Development
4.8.1 System Development Life Cycle (8:40)
4.8.2 System Development Life Cycle 2 (7:49)
4.8.3 SDLC Facts
4.8.4 Software Development Models
4.8.5 Practice Questions - Section 4.8
4.9 Employee Management
4.9.1 Employment Practices (13:45)
4.9.2 Employee Management Facts
4.9.3 Employee Documents Facts
4.9.4 Ethics Facts
4.9.5 Practice Questions - Section 4.9
4.10 Third-Party Integration
4.10.1 Third-Party Integration Security Issues (11:24)
4.10.2 Third-Party Integration Security Facts
4.10.3 Practice Questions - Section 4.10

5.0 PHYSICAL SECURITY
5.1 Physical Security
5.1.1 Physical Security (18:39)
5.1.2 Tailgating and Piggybacking (3:28)
5.1.3 Physical Security Facts
5.1.4 Implement Physical Security
5.1.5 Practice Questions - Section 5.1
5.0 PHYSICAL SECURITY
5.1 Physical Security
5.1.1 Physical Security (18:39)
5.1.2 Tailgating and Piggybacking (3:28)
5.1.3 Physical Security Facts
5.1.4 Implement Physical Security
5.1.5 Practice Questions - Section 5.1

6.0 PERIMETER DEFENSES
6.1 Network Layer Protocol Review
6.1.1 OSI Model (4:08)
6.1.2 OSI Model Facts
6.1.3 IP Addressing (17:22)
6.1.4 IP Address Facts
6.1.5 Configuring IPv6 (5:28)
6.1.6 IP Subnetting (12:35)
6.1.7 Configuring Subnetting (8:07)
6.1.8 Subnetting Facts
6.1.9 Practice Questions - Section 6.1
6.2 Transport Layer Protocol Review
6.2.1 Network Protocols (4:45)
6.2.2 Network Protocol Facts
6.2.3 Analyzing a TCP Three-way Handshake (2:14)
6.2.4 TCP and UDP Ports (9:02)
6.2.5 Common Ports
6.2.6 Practice Questions - Section 6.2
6.3 Perimeter Attacks 1
6.3.1 Reconnaissance (2:40)
6.3.2 Performing Reconnaissance (9:01)
6.3.3 Reconnaissance Facts
6.3.4 Denial of Service (DoS) (7:49)
6.3.5 Xmas Tree Attacks (3:23)
6.3.6 DoS Attack Facts
6.3.7 Performing a UDP Flood Attack (3:54)
6.3.8 Practice Questions - Section 6.3
6.4 Perimeter Attacks 2
6.4.1 Session and Spoofing Attacks (6:41)
6.4.2 Session Based Attack Facts
6.4.3 Performing ARP Poisoning (4:24)
6.4.4 Spoofing Facts
6.4.5 DNS Attacks (4:30)
6.4.6 DNS Attack Facts
6.4.7 Examining DNS Attacks (13:29)
6.4.8 Prevent Zone Transfers
6.4.9 Practice Questions - Section 6.4
6.5 Security Appliances
6.5.1 Security Solutions (4:02)
6.5.2 Security Zones (5:32)
6.5.3 Security Zone Facts
6.5.4 All-In-One Security Appliances (4:30)
6.5.5 Security Solution Facts
6.5.6 Configuring Network Security Appliance Access (6:55)
6.5.7 Configure Network Security Appliance Access
6.5.8 Practice Questions - Section 6.5
6.6 Demilitarized Zones (DMZ)
6.6.1 Demilitarized Zones (9:49)
6.6.2 Configuring a DMZ (5:42)
6.6.3 Configure a DMZ
6.6.4 DMZ Facts
6.6.5 Practice Questions - Section 6.6
6.7 Firewalls
6.7.1 Firewalls (5:33)
6.7.2 Firewall Facts
6.7.3 Configuring a Perimeter Firewall (9:47)
6.7.4 Configure a Perimeter Firewall
6.7.5 Practice Questions - Section 6.7
6.8 Network Address Translation (NAT)
6.8.1 Network Address Translation (15:57)
6.8.2 Configuring NAT (5:11)
6.8.3 NAT Facts
6.8.4 Practice Questions - Section 6.8
6.9 Virtual Private Networks (VPN)
6.9.1 Virtual Private Networks (VPNs) (10:16)
6.9.2 Configuring a VPN (4:25)
6.9.3 Configure a Remote Access VPN
6.9.4 Configure a VPN Connection iPad
6.9.5 VPN Facts
6.9.6 VPN Protocol Facts
6.9.7 Practice Questions - Section 6.9
6.10 Web Threat Protection
6.10.1 Web Threat Protection (9:29)
6.10.2 Configuring Web Threat Protection (4:26)
6.10.3 Configure Web Threat Protection
6.10.4 Web Threat Protection Facts
6.10.5 Practice Questions - Section 6.10
6.11 Network Access Control (NAC)
6.11.1 Network Access Protection (19:58)
6.11.2 Implementing NAP with DHCP Enforcement (15:56)
6.11.3 NAP Facts
6.11.4 Practice Questions - Section 6.11
6.12 Wireless Overview
6.12.1 Wireless Networking Overview (5:35)
6.12.2 Wireless Antenna Types (8:03)
6.12.3 Wireless Networking Facts
6.12.4 Wireless Encryption (6:46)
6.12.5 Wireless Encryption Facts
6.12.6 Configuring a Wireless Connection (12:22)
6.12.7 Secure a Wireless Network
6.12.8 Practice Questions - Section 6.12
6.13 Wireless Attacks
6.13.1 Wireless Attacks (13:29)
6.13.2 Wireless Attack Facts
6.13.3 Using Wireless Attack Tools (9:06)
6.13.4 Detecting Rogue Hosts (7:37)
6.13.5 Practice Questions - Section 6.13
6.14 Wireless Defenses
6.14.1 Wireless Security Considerations (12:54)
6.14.2 Wireless Authentication (4:40)
6.14.3 Wireless Authentication Facts
6.14.4 Configuring a Wireless Access Point (19:54)
6.14.5 Obscure a Wireless Network
6.14.6 Configure a Wireless Profile
6.14.7 Configuring a Captive Portal (12:02)
6.14.8 Wireless Security Facts
6.14.9 Practice Questions - Section 6.14

7.0 NETWORK DEFENSES
7.1 Network Devices
7.1.1 Network Devices (5:51)
7.1.2 Network Device Facts
7.1.3 Practice Questions - Section 7.1
7.2 Network Device Vulnerabilities
7.2.1 Device Vulnerabilities (1:47)
7.2.2 Device Vulnerability Facts
7.2.3 Searching Defaultpasswords.com (1:23)
7.2.4 Securing a Switch (3:21)
7.2.5 Secure a Switch
7.2.6 Practice Questions - Section 7.2
7.3 Switch Attacks
7.3.1 Switch Attacks (5:04)
7.3.2 Switch Attack Facts
7.3.3 Practice Questions - Section 7.3
7.4 Router Security
7.4.1 Router Security (8:57)
7.4.2 Router Security Facts
7.4.3 Practice Questions - Section 7.4
7.5 Switch Security
7.5.1 Switch Security (13:01)
7.5.2 Switch Loop Protection (10:47)
7.5.3 Switch Security Facts
7.5.4 Configuring VLANs from the CLI (4:32)
7.5.5 Explore VLANs from the CLI
7.5.6 Configuring VLANs (3:32)
7.5.7 Explore VLANs
7.5.8 Hardening a Switch (14:10)
7.5.9 Harden a Switch
7.5.10 Secure Access to a Switch
7.5.11 Secure Access to a Switch 2
7.5.12 Practice Questions - Section 7.5
7.6 Intrusion Detection and Prevention
7.6.1 Intrusion Detection (7:14)
7.6.2 Detection vs. Prevention Controls (7:50)
7.6.3 IDS Facts
7.6.4 Implementing Intrusion Monitoring (3:33)
7.6.5 Implementing Intrusion Prevention (7:51)
7.6.6 Implement Intrusion Prevention
7.6.7 Practice Questions - Section 7.6
7.7 SAN Security
7.7.1 SAN Security Issues (14:32)
7.7.2 Configuring an iSCSI SAN (9:57)
7.7.3 SAN Security Facts
7.7.4 Practice Questions - Section 7.7


8.0 HOST DEFENSES
8.1 Malware
8.1.1 Malware (9:28)
8.1.2 Malware Facts
8.1.3 Malware Protection Facts
8.1.4 Implementing Malware Protections (23:43)
8.1.5 Using Windows Defender (14:22)
8.1.6 Configure Windows Defender
8.1.7 Practice Questions - Section 8.1
8.2 Password Attacks
8.2.1 Password Attacks (2:04)
8.2.2 Password Attack Facts
8.2.3 Using Rainbow Tables (4:48)
8.2.4 Capturing Passwords (5:40)
8.2.5 Practice Questions - Section 8.2
8.3 Windows System Hardening
8.3.1 Operating System Hardening (5:13)
8.3.2 Hardening Facts
8.3.3 Hardening an Operating System (6:41)
8.3.4 Managing Automatic Updates (18:31)
8.3.5 Configure Automatic Updates
8.3.6 Configuring Windows Firewall (10:11)
8.3.7 Configure Windows Firewall
8.3.8 Configuring Windows Firewall Advanced Features (16:59)
8.3.9 Configuring Parental Controls (18:21)
8.3.10 Configure Parental Controls
8.3.11 Practice Questions - Section 8.3
8.4 Hardening Enforcement
8.4.1 Hardening Enforcement with GPOs (1:50)
8.4.2 Using Security Templates and Group Policy (6:53)
8.4.3 Configuring GPOs to Enforce Security (15:24)
8.4.4 Hardening Enforcement Facts
8.4.5 Manage Services with Group Policy
8.4.6 Practice Questions - Section 8.4
8.5 File Server Security
8.5.1 File Server Security (7:58)
8.5.2 Scanning for Open Ports (3:52)
8.5.3 File System Security Facts
8.5.4 File Permission Facts
8.5.5 Configuring NTFS Permissions (14:05)
8.5.6 Configure NTFS Permissions
8.5.7 Disable Inheritance
8.5.8 Practice Questions - Section 8.5
8.6 Linux Host Security
8.6.1 Linux Host Security (7:10)
8.6.2 Removing Unneeded Services and Scanning Ports (6:30)
8.6.3 Network Security Facts
8.6.4 Practice Questions - Section 8.6
8.7 Static Environment Security
8.7.1 Security Risks in Static Environments (4:26)
8.7.2 Static Environment Security Facts
8.7.3 Practice Questions - Section 8.7

9.0 APPLICATION DEFENSES
9.1 Web Application Attacks
9.1.1 Web Application Attacks (2:49)
9.1.2 Cross-site Request Forgery (XSRF) Attack (10:51)
9.1.3 Injection Attacks (14:30)
9.1.4 Header Manipulation (9:01)
9.1.5 Zero Day Application Attacks (6:59)
9.1.6 Client Side Attacks (6:22)
9.1.7 Web Application Attack Facts
9.1.8 Preventing Cross-site Scripting (4:05)
9.1.9 Practice Questions - Section 9.1
9.2 Internet Browsers
9.2.1 Managing Security Zones and Add-ons (20:26)
9.2.2 Configuring IE Enhanced Security (9:11)
9.2.3 Managing Cookies (12:38)
9.2.4 Configure Cookie Handling
9.2.5 Clearing the Browser Cache (9:28)
9.2.6 Clear the Browser Cache
9.2.7 Implementing Popup Blockers (7:26)
9.2.8 Configure IE Popup Blocker
9.2.9 Internet Explorer Security Facts
9.2.10 Enforcing IE Settings through GPO (12:47)
9.2.11 Enforce IE Settings through GPO
9.2.12 Configure IE Preferences in a GPO
9.2.13 Practice Questions - Section 9.2
9.3 E-mail
9.3.1 E-mail Security (4:43)
9.3.2 E-mail Security Facts
9.3.3 Protecting a Client from Spam (10:29)
9.3.4 Securing an E-mail Server (2:45)
9.3.5 Configure E-mail Filters
9.3.6 Securing E-mail on iPad (5:52)
9.3.7 Secure E-mail on iPad
9.3.8 Practice Questions - Section 9.3
9.4 Network Applications
9.4.1 Network Application Security (2:19)
9.4.2 Spim (3:43)
9.4.3 Using Peer-to-peer Software (3:04)
9.4.4 Securing Windows Messenger (2:48)
9.4.5 Configuring Application Control Software (9:05)
9.4.6 Network Application Facts
9.4.7 Practice Questions - Section 9.4
9.5 Virtualization
9.5.1 Virtualization Introduction (4:01)
9.5.2 Virtualization Benefits (3:08)
9.5.3 Load Balancing with Virtualization (10:40)
9.5.4 Creating Virtual Machines (4:22)
9.5.5 Managing Virtual Machines (5:09)
9.5.6 Create Virtual Machines
9.5.7 Adding Virtual Network Adapters (1:30)
9.5.8 Creating Virtual Switches (3:26)
9.5.9 Create Virtual Switches
9.5.10 Virtualization Facts
9.5.11 Practice Questions - Section 9.5
9.6 Application Development
9.6.1 Secure Coding Concepts (16:18)
9.6.2 Application Hardening (11:02)
9.6.3 Application Development Security Facts
9.6.4 Hardening Applications on Linux (4:26)
9.6.5 Implementing Application Whitelisting with AppLocker (13:03)
9.6.6 Implement Application Whitelisting with AppLocker
9.6.7 Implementing Data Execution Preventions (DEP) (4:01)
9.6.8 Implement Data Execution Preventions (DEP)
9.6.9 Hardening Applications Facts
9.6.10 NoSQL Security (5:18)
9.6.11 NoSQL Security Facts
9.6.12 Practice Questions - Section 9.6

10.0 DATA DEFENSES
10.1 Redundancy
10.1.1 Redundancy (4:55)
10.1.2 Redundancy Measurement Parameters (5:12)
10.1.3 Redundancy Facts
10.1.4 RAID (7:27)
10.1.5 Implementing RAID (6:16)
10.1.6 RAID Facts
10.1.7 Configure Fault Tolerant Volumes
10.1.8 Clustering (9:06)
10.1.9 Clustering Facts
10.1.10 Practice Questions - Section 10.1
10.2 Backup and Restore
10.2.1 Backup and Restore (13:27)
10.2.2 Backup and Restore Facts
10.2.3 Backup Management Facts
10.2.4 Backing Up Workstations (6:18)
10.2.5 Back Up a Workstation
10.2.6 Restoring Workstation Data from Backup (2:19)
10.2.8 Back Up a Domain Controller
10.2.9 Restoring Server Data from Backup (2:12)
10.2.10 Practice Questions - Section 10.2
10.3 File Encryption
10.3.1 Encrypting File System (EFS) (11:47)
10.3.2 Securing Files using EFS (11:45)
10.3.3 Encrypt Files with EFS
10.3.4 PGP and GPG (4:34)
10.3.5 Encrypting Files with GPG (4:58)
10.3.6 BitLocker and Database Encryption (13:02)
10.3.7 Configuring BitLocker (6:17)
10.3.8 Configure BitLocker with a TPM
10.3.9 File Encryption Facts
10.3.10 Practice Questions - Section 10.3
10.4 Secure Protocols
10.4.1 Secure Protocols (8:44)
10.4.2 Secure Protocols 2 (15:26)
10.4.3 Secure Protocols Facts
10.4.4 Adding SSL to a Web Site (5:23)
10.4.5 Allow SSL Connections
10.4.6 IPSec (5:14)
10.4.7 IPSec Facts
10.4.8 Requiring IPSec for Communications (14:22)
10.4.9 Practice Questions - Section 10.4
10.5 Cloud Computing
10.5.1 Cloud Computing Introduction (15:59)
10.5.2 Cloud Computing Security Issues (6:32)
10.5.3 Cloud Computing Facts
10.5.4 Practice Questions - Section 10.5

11.0 ASSESSMENTS AND AUDITS
11.1 Vulnerability Assessment
11.1.1 Vulnerability Assessment (4:55)
11.1.2 Vulnerability Assessment Facts
11.1.3 Scanning a Network with Nessus (18:26)
11.1.4 Scanning a Network with Retina (12:12)
11.1.5 Scanning for Vulnerabilities Using MBSA (6:02)
10.2.7 Backing Up a Domain Controller (2:33)
11.1.6 Review a Vulnerability Scan 1
11.1.7 Review a Vulnerability Scan 2
11.1.8 Review a Vulnerability Scan 3
11.1.9 Performing Port and Ping Scans (2:36)
11.1.10 Checking for Weak Passwords (9:21)
11.1.11 Practice Questions - Section 11.1
11.2 Penetration Testing
11.2.1 Penetration Testing (2:32)
11.2.2 Penetration Testing Facts
11.2.3 Exploring Penetration Testing Tools (11:22)
11.2.4 Practice Questions - Section 11.2
11.3 Protocol Analyzers
11.3.1 Protocol Analyzers (3:07)
11.3.2 Protocol Analyzer Facts
11.3.3 Analyzing Network Traffic (6:50)
11.3.4 Practice Questions - Section 11.3
11.4 Log Management
11.4.1 Logs (3:25)
11.4.2 Log Facts
11.4.3 Logging Events with Event Viewer (3:52)
11.4.4 Windows Event Subscriptions (10:36)
11.4.5 Configuring Source-initiated Subscriptions (4:50)
11.4.6 Configuring Remote Logging on Linux (8:23)
11.4.7 Remote Logging Facts
11.4.8 Practice Questions - Section 11.4
11.5 Audits
11.5.1 Audits (3:13)
11.5.2 Audit Facts
11.5.3 Auditing the Windows Security Log (11:41)
11.5.4 Configure Advanced Audit Policy
11.5.5 Auditing Device Logs (6:57)
11.5.6 Enable Device Logs
11.5.7 Practice Questions - Section 11.5

A.0 SECURITY PRO PRACTICE EXAMS
A.1 Preparing for Certification
A.1.1 Security Pro Exam Objectives
A.1.2 Security Pro Exam Objectives by Course Section
A.1.3 How to take the Certification Exam
A.1.4 Certification FAQs
A.2 Security Pro Domain 1: Access Control and Identity Management
A.3 Security Pro Domain 2: Policies, Procedures, Awareness
A.4 Security Pro Domain 3: Physical Security
A.5 Security Pro Domain 4: Perimeter Defenses
A.6 Security Pro Domain 5: Network Defenses
A.7 Security Pro Domain 6: Host Defenses
A.8 Security Pro Domain 7: Application Defenses
A.9 Security Pro Domain 8: Data Defenses
A.10 Security Pro Domain 9: Audits and Assessments
A.11 Security Pro Certification Practice Exam

B.0 COMPTIA SECURITY+ PRACTICE EXAMS
B.1 Preparing for Certification
B.1.1 CompTIA Security+ Exam Objectives
B.1.2 CompTIA Security+ Exam Objectives by Course Section
B.1.3 Exam FAQs
B.1.4 How to Register for an Exam
B.1.5 Exam-taking Hints and Tips
B.1.6 Why Certify?
B.2 CompTIA Security+ Domain 1: Network Security, All Questions
B.3 CompTIA Security+ Domain 2: Compliance and Operational Security, All Questions
B.4 CompTIA Security+ Domain 3: Threats and Vulnerabilities, All Questions
B.5 CompTIA Security+ Domain 4: Application, Data and Host Security, All Questions
B.6 CompTIA Security+ Domain 5: Access Control and Identity Management, All Questions
B.7 CompTIA Security+ Domain 6: Cryptography, All Questions
B.8 CompTIA Security+ Certification Practice Exam

Hands-on, Multimedia, and Self-paced Training
Featured Customers
Free Newsletter

Get the same IT Training used by 1000's of Schools and Companies.

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

IT Certification Training Library Video Training Lab Exercises Practice Exams